Attacks by “Anonymous” WikiLeaks Proponents not Anonymous
نویسندگان
چکیده
On November 28, 2010, the world started watching the whistle blower website WikiLeaks [1] to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S. international affairs from 274 different embassies, covering topics such as analysis of host countries and leaders and even requests for spying out United Nations leaders [2]. The release of these cables has caused reactions not only in the real world, but also on the Internet. In fact, a cyberwar started just before the initial release. Wikileaks has reported that their servers were experiencing distributed denial-ofservice attacks (DDoS) [3]. A DDoS attack consists of many computers trying to overload a server by firing a high number of requests, leading ultimately to service disruption. In this case, the goal was to avoid the release of the embassy cables. After the initial cable release, several companies started severed ties with WikiLeaks. One of the first was Amazon.com, that removed the WikiLeaks website from their servers [4]. Next, EveryDNS, a company in which the domain wikileaks.org was registered, dropped the domain entries from its servers. On December 4th, PayPal cancelled the account that WikiLeaks was using to receive
منابع مشابه
Anonymous: serious threat or mere annoyance?
Anonymous originates from the 4chan. org message board, an ‘anything goes’ website that allows users to post images and comments without registering. They can use names (any names) or they can post without identifying themselves, in which case the posting is labelled ‘Anonymous’. The site became a rallying point for a series of (mostly juvenile) pranks and campaigns. Before the Wikileaks-relate...
متن کاملCyber attacks: awareness
7. Geosynchronous Orbital Ion Cannon source code. Accessed Jan 2011. . 8. Moyer, E. ‘Report: FBI seizes server in probe of Wikileaks attacks’. CNET, 1 Jan 2011. Accessed Jan 2011. . 9. ‘Jester’s Court’. . 10.Leyden, J. ‘Anonymous hacktivists fire ion cannons at Zimbabwe’. The Regi...
متن کاملمقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد
Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...
متن کاملValidation and Validation of Testimony of Anonymous Instances in the Criminal Procedure Code of Iran and Statute of the International Criminal Court
One of the measures taken to protect witnesses in the Statute of the International Criminal Court and the Code of Judicial Procedure of our country is to keep their identities secret. Both the defendant is important and the defendant's right can not be ignored for the sake of witness testimony or the defendant's defense rights were endangered and threatened without regard to witness safety. Reg...
متن کاملComparing the effects of combined cognitive behavioral therapy and methadone therapy with the association of narcotics anonymous addicts on executive functions of quitting drugs volunteer addicts in Jiroft
Introduction: Currently, a combination of drug and psychological therapies is common to treat and prevent relapse in addicts. One of the most important strategies for recovery and prevention of relapse is psychological therapy and maintenance therapy applying drugs such as methadone. Therefore, the present study compares the effect of cognitive-behavioral and methadone therapy combination thera...
متن کامل